[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:201971
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. MySQL did not correctly check directories used as arguments for the DATA DIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated attacker cou ...

oval:org.secpod.oval:def:20680
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB storage engine. Successful exploitation allows remote authenticated users to cause a denial of service (assertion fai ...

oval:org.secpod.oval:def:5565
The host is installed with 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

oval:org.secpod.oval:def:10640
The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.30 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allo ...

oval:org.secpod.oval:def:10641
The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.28 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allo ...

oval:org.secpod.oval:def:201740
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ...

oval:org.secpod.oval:def:201737
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ...

oval:org.secpod.oval:def:5564
The host is installed with 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Partition. Successful exploitation could allow remote authenticated users to affect availability.

oval:org.secpod.oval:def:8943
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:8944
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:8940
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availab ...

oval:org.secpod.oval:def:8941
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows remote attackers to affect availability.

oval:org.secpod.oval:def:7295
The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.22 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect ...

oval:org.secpod.oval:def:7293
The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.23 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect ...

oval:org.secpod.oval:def:7294
The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.23 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to GIS Extension. Successful exploitation allows remote authenticated users to affect availabili ...

oval:org.secpod.oval:def:14861
The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect av ...

oval:org.secpod.oval:def:14862
The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Full Text Search. Successful exploitation allows attackers to affect av ...

oval:org.secpod.oval:def:14857
The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Options. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:8929
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availab ...

oval:org.secpod.oval:def:1500086
Updated mysql packages that fix several security issues are now availablefor Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give detailed severity ratings, are available for ...

oval:org.secpod.oval:def:8931
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows local users to affect confidentiality and ...

oval:org.secpod.oval:def:8932
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows remote authenticated users to affect avail ...

oval:org.secpod.oval:def:8933
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows remote attackers to affect availability.

oval:org.secpod.oval:def:8934
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect confi ...

oval:org.secpod.oval:def:8939
The host is installed with Oracle MySQL 5.1.x through 5.1.65 or 5.5.x through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to GIS Extension. Successful exploitation allows remote authenticated users to affect availabili ...

oval:org.secpod.oval:def:7479
The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:7475
The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows remote authenticated users to affect confidential ...

oval:org.secpod.oval:def:7476
The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Installation. Successful exploitation allows local users to affect confidentiality.

oval:org.secpod.oval:def:7477
The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Protocol. Successful exploitation allows remote attackers to affect confidentiality, integrity, and ...

oval:org.secpod.oval:def:202151
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. MySQL did not correctly check directories used as arguments for the DATA DIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated attacker cou ...

oval:org.secpod.oval:def:1500163
Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are availabl ...

oval:org.secpod.oval:def:7471
The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:7474
The host is installed with MySQL 5.1.0 through 5.1.63 or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:7470
The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability.

oval:org.secpod.oval:def:7486
The host is installed with Oracle MySQL 5.0.x before 5.0.93 or 5.1.x before 5.1.50 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle the slave configurations in which the slave is running a newer version than the master. Successful exploitation ...

oval:org.secpod.oval:def:7485
The host is installed with Oracle MySQL 5.1.x before 5.1.62 or 5.5.x before 5.5.22 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle HANDLER READ NEXT command. Successful exploitation allows an assertion failure and mysqld abort.

oval:org.mitre.oval:def:11869
MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA D ...

oval:org.secpod.oval:def:7469
The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect availability ...

oval:org.secpod.oval:def:7473
The host is installed with MySQL 5.1.0 through 5.1.63 or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Full Text Search. Successful exploitation allows remote authenticated users to affect availab ...

oval:org.secpod.oval:def:7472
The host is installed with MySQL 5.1.0 through 5.1.63 InnoDB Plugin. or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB Plugin. Successful exploitation allows remote authenticated users to affect av ...

oval:org.secpod.oval:def:8244
The host is installed with MySQL 5.5.x before 5.5.22 or 5.1.x before 5.1.62 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle yaSSL. Successful exploitation allows remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:202250
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:202540
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:500834
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide ...

oval:org.secpod.oval:def:202383
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide ...

oval:org.secpod.oval:def:10870
The host is installed with Oracle MySQL 5.5.29 or earlier, 5.1.67 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:10863
The host is installed with Oracle MySQL 5.1.63 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Types. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:501051
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pa ...

oval:org.secpod.oval:def:10850
The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Install. Successful exploitation allows attackers to affect confidentiali ...

oval:org.secpod.oval:def:10849
The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect availabilit ...

oval:org.secpod.oval:def:10860
The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Partition. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:10861
The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

oval:org.secpod.oval:def:10851
The host is installed with Oracle MySQL 5.5.29 or earlier or 5.1.67 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:10852
The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:10854
The host is installed with Oracle MySQL 5.1.67 or earlier, 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows attackers to affect confident ...

oval:org.secpod.oval:def:202875
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:4001
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:4002
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:4000
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:4005
The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial integrity impact. Successful exploitation allows remote attackers to cause a denial ...

oval:org.secpod.oval:def:4003
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:4004
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:500334
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ...

oval:org.secpod.oval:def:202531
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysql ...

oval:org.secpod.oval:def:1500107
Updated mysql packages that fix one security issue and several bugs are nowavailable for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having lowsecurity impact. A Common Vulnerability Scoring System base score,which gives a detailed severity rating, is ava ...

oval:org.secpod.oval:def:5563
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect avai ...

oval:org.secpod.oval:def:5568
The host is installed with MySQL 5.1.60 or earlier or 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availabili ...

oval:org.secpod.oval:def:5567
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availabili ...

oval:org.secpod.oval:def:5566
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect avai ...

oval:org.secpod.oval:def:202529
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the fix for the CVE-2009-4030 issue, a flaw in the way MySQL checked the paths used as arguments for the DATA DIRECTORY and INDEX DIRECTORY dir ...

oval:org.secpod.oval:def:20676
The host is installed with Oracle MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24 or 6.0.x before 6.0.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows local users ...

oval:org.secpod.oval:def:20677
The host is installed with Oracle MySQL 5.0 before 5.0.66, 5.1 before 5.1.26 or 6.0 before 6.0.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle handle a b'' (b single-quote single-quote) token. Successful exploitation allows remo ...

oval:org.mitre.oval:def:8500
mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote auth ...

oval:org.secpod.oval:def:20683
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers an access of uninitialized memory. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon cra ...

oval:org.secpod.oval:def:20684
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of ...

oval:org.secpod.oval:def:20681
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a join query that uses a table with a unique SET column. Successful exploitation allows remote authenti ...

oval:org.secpod.oval:def:201942
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ...

oval:org.secpod.oval:def:20682
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Successful exploitation all ...

oval:org.mitre.oval:def:8156
MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future ...

oval:org.secpod.oval:def:500664
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. MySQL did not correctly check directories used as arguments for the DATA DIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated attacker cou ...

oval:org.secpod.oval:def:500953
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysql ...

oval:org.secpod.oval:def:500958
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:201852
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ...

oval:org.secpod.oval:def:7484
The host is installed with Oracle MySQL 5.1.x before 5.1.63 or 5.5.x before 5.5.24 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to incorrect calculation and a sort order index. Successful exploitation allows remote authe ...

oval:org.secpod.oval:def:202491
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:20689
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle vectors related to "materializing a derived table that required a temporary table for group ...

oval:org.secpod.oval:def:20687
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation allows remote authenticated users to cause a denial of servic ...

oval:org.secpod.oval:def:20688
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly propagate type errors. Successful exploitation allows remote authenticated users to cause a ...

oval:org.secpod.oval:def:20685
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform alternate reads from two indexes on a table, which triggers an assertion failure. Successful exploitati ...

oval:org.secpod.oval:def:20686
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. Successful exploitation allows remote authe ...

oval:org.secpod.oval:def:1500071
Updated mysql packages that fix two security issues are now available forRed Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System basescores, which give detailed severity ratings, are available for ...

oval:org.mitre.oval:def:8510
The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate ...

oval:org.secpod.oval:def:500741
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:20694
The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handle a query with nested JOIN statements. Successful exploitation allows remote authenticated users to cause a ...

oval:org.secpod.oval:def:20695
The host is installed with Oracle MySQL 5.1 before 5.1.51 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted number of (1) line strings or (2) line points. Successful exploitation allows remote authenticated users to cause ...

oval:org.secpod.oval:def:20692
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modi ...

oval:org.secpod.oval:def:20693
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handled when the function's result is "processed using an intermediate temporary table.". Succ ...

oval:org.secpod.oval:def:20690
The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which causes the expression to be re-evaluated instead of accessing its value from the table. Successful exploitation allows remote aut ...

oval:org.secpod.oval:def:20691
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimi ...

oval:org.secpod.oval:def:3990
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:3991
The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality impact. Successful exploitation allows remote attackers to cause a ...

oval:org.secpod.oval:def:3994
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and availability impact. Successful exploitation allows remote attackers to cause a denial ...

oval:org.secpod.oval:def:3992
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:3993
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:3998
The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and integrity impact. Successful exploitation allows remote attacke ...

oval:org.secpod.oval:def:3999
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and availability impact. Successful exploitation allows remote attackers to cause a denial ...

oval:org.secpod.oval:def:3996
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and integrity impact. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:3997
The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:500482
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ...

oval:org.secpod.oval:def:500925
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:3983
The host is installed with Oracle MySQL 5.1.x before 5.5.61 or 5.5.x before 5.5.20 and is prone unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service.

oval:org.secpod.oval:def:3985
The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a den ...

oval:org.secpod.oval:def:500146
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. The MySQL PolyFromWKB function did not sanity check Well-Known Binary data, which could allow a remote, authenticated attacker to crash mysqld. A flaw in the w ...

oval:org.secpod.oval:def:500948
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the fix for the CVE-2009-4030 issue, a flaw in the way MySQL checked the paths used as arguments for the DATA DIRECTORY and INDEX DIRECTORY dir ...

oval:org.secpod.oval:def:16596
The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to InnoDB. Successful exploitation allows remote authenti ...

oval:org.secpod.oval:def:16597
The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Optimizer. Successful exploitation allows remote authe ...

oval:org.secpod.oval:def:16591
The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Error Handling. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:16594
The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Locking. Successful exploitation allows remote authent ...

oval:org.secpod.oval:def:16595
The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote authenticated users to aff ...

oval:org.secpod.oval:def:16593
The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Error Handling. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:501185
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:16602
The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to InnoDB. Successful exploitation allows remote authenti ...

oval:org.secpod.oval:def:501368
Updated mysql packages that fix several bugs are now available for Red Hat Enterprise Linux 6. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes the following bugs: * Prior to this update, the ...

oval:org.secpod.oval:def:601197
This DSA updates the MySQL 5.1 database to 5.1.73

oval:org.secpod.oval:def:203028
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.secpod.oval:def:1500387
Updated mysql packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, a ...

oval:org.secpod.oval:def:201694
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A buffer overflow flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command . An authenticated database user co ...

oval:org.secpod.oval:def:202236
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.mitre.oval:def:7210
Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot) in a table name.

oval:org.secpod.oval:def:201861
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A buffer overflow flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command . An authenticated database user co ...

oval:org.mitre.oval:def:7328
The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.

oval:org.secpod.oval:def:500299
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A buffer overflow flaw was found in the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command . An authenticated database user co ...

oval:org.secpod.oval:def:500739
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ...

oval:org.mitre.oval:def:6693
Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.

CVE    103
CVE-2007-2692
CVE-2007-2691
CVE-2008-0226
CVE-2008-2079
...
*CPE
cpe:/a:mysql:mysql:5.1.4

© SecPod Technologies